Security Building

Results: 4307



#Item
151Secure communication / Health informatics / Health Insurance Portability and Accountability Act / Privacy / Data breach / Medical record / Medical privacy / Computer security / Protected health information / Text messaging / Internet privacy / Electronic health record

Newsle er of the Office of HIPAA Privacy & Security  Respec ng Pa ent Privacy, Building Pa ent Trust!   July 2015 ‐ Issue 32 What’s

Add to Reading List

Source URL: privacy.med.miami.edu

Language: English - Date: 2015-07-22 11:57:55
152Sewerage / Water management / Water pollution / Aquatic ecology / Irrigation / Sanitation / Water supply / Wastewater / Tap water / Water treatment / Water resources / Drinking water supply and sanitation in the United States

TECHNOLOGY Building an Ultra Water Saving Society Launched in 2007, the Water Security Council of Japan, or Team Water Japan, has been discussing a new water system for a global population of 10 billion. The Building Re

Add to Reading List

Source URL: www.kenken.go.jp

Language: English - Date: 2011-08-31 00:30:23
153Building automation / Sustainable urban planning / Computer security / Wi-Fi / Internet privacy / Efficient energy use / Computer network

Using Existing* Networks For Energy Purposes Bruce Nordman, Alan Meier October 7, 2009 (*”existing” can be either those already in place today, or those installed in future for non-energy purposes) Much activity in e

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2011-10-17 19:46:05
154Employment / Recruitment / Background check / Law enforcement / Security / Criminal record / Expungement in the United States

OFFICE OF SUPERINTENDENT OF SCHOOLS School Administrative Unit No. 2 c/o Humiston Building 103 Main Street, Suite 2 Meredith, NHTel

Add to Reading List

Source URL: interlakes.org

Language: English - Date: 2016-08-17 12:25:25
155Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
156Welfare economics / Social programs / Welfare state / Social systems / Public economics / Social protection floor / Social protection / Conditional cash transfer / Social security / Welfare / Cash transfers / Poverty

In this edition: From the Editor This is a Special Issue on Social Protection Floor Initiatives in South Asian Countries. The first article is to give an idea about building Social Protection Floor Initiatives for the d

Add to Reading List

Source URL: www.icsw.org

Language: English - Date: 2015-08-21 13:04:30
157Internet privacy / Dark web / Cryptographic software / Secure communication / Crypto-anarchism / Onion routing / Tor / I2P / Overlay network / Degree of anonymity / Mixminion / Routing

On Building Onion Routing into Future Internet Architectures⋆ Daniele E. Asoni, Chen Chen, David Barrera, and Adrian Perrig Network Security Group Department of Computer Science ETH Z¨urich

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-02-29 10:24:01
158Fence / Perimeter security / Used good

7 ge St a Building Guidelines All dwellings must be of the highest standard. We have the expectation that each

Add to Reading List

Source URL: www.sovereignpalms.co.nz

Language: English - Date: 2016-02-25 16:15:32
159Sustainability organisations / United Nations Development Programme / Water security / Global Water Partnership / World Bank / Swiss Federal Institute of Aquatic Science and Technology / GWP / Global Environment Facility / Federal Ministry for the Environment /  Nature Conservation /  Building and Nuclear Safety

Convenors Short Earth Security Group Earthwatch

Add to Reading List

Source URL: www.worldwaterweek.org

Language: English - Date: 2016-04-14 07:54:25
160Nuclear proliferation / Nuclear weapons / Nuclear Threat Initiative / World Institute for Nuclear Security / Nuclear terrorism / Nuclear safety and security / Global Initiative to Combat Nuclear Terrorism / NTI / United Nations Security Council Resolution / International Atomic Energy Agency / Nuclear Security Summit

Building a Framework for Assurance, Accountability, and Action EIU Methodology EIU METHODOLOGY CONTENTS SUMMARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: ntiindex.org

Language: English - Date: 2016-03-09 11:44:31
UPDATE